Desynchronization with an Artificial Force Field for Wireless Networks

Size: px
Start display at page:

Download "Desynchronization with an Artificial Force Field for Wireless Networks"

Transcription

1 Desynchronization with an Artificial Force Field for Wireless Networks Supasate Choochaisri Kittipat Apicharttrisorn Kittiporn Korprasertthaworn Pongpakdi Taechalertpaisarn Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand {supasatec, kittipatap, kittipornk, ABSTRACT Desynchronization is useful for scheduling nodes to perform tasks at different time This property is desirable for resource sharing, TDMA scheduling, and collision avoiding Inspired by robotic circular formation, we propose DWARF (Desynchronization With an ARtificial Force field), a novel technique for desynchronization in wireless networks Each neighboring node has artificial forces to repel other nodes to perform tasks at different time phases Nodes with closer time phases have stronger forces to repel each other in the time domain Each node adjusts its time phase proportionally to its received forces Once the received forces are balanced, nodes are desynchronized We evaluate our implementation of DWARF on TOSSIM, a simulator for wireless sensor networks The simulation results indicate that DWARF incurs significantly lower desynchronization error and scales much better than existing approaches Categories and Subject Descriptors C [Computer-Communication Networks]: Network Architecture and Design Distributed Networks General Terms Algorithms, Design, Performance Keywords desynchronization, self-organizing, sensor networks, wireless networks INTRODUCTION Networked, distributed systems usually cooperate to have a common notion of time in order to accomplish tasks with consistent results through time synchronization protocols Authors would like to thank Assoc Prof Dr Paisan Nakmahachalasint and three anonymous reviewers for their valuable comments and suggestions to revise and improve this work Supported by CU CP Academic Excellence Scholarship from Department of Computer Engineering, Faculty of Engineering, Chulalongkorn University Corresponding Author Figure : Desynchronization Framework (Left) Nodes are placed and labeled on the time circle Node i has the time phase φ i and the phase difference i with its previous phase neighbor i+ is the phase difference between node i and its next phase neighbor (Right) The positions of nodes in the perfect desynchrony state (eg, TPSN [5], FTSP [9], GTSP [6], and EGTSP []) However, some systems simply require nodes to work at the same time (eg, Firefly Synchronicity [7]) In such systems, a global notion of time may not be necessary Conversely, some systems require nodes not to work at the same time (ie, to desynchronize) Desynchronization organizes all accesses to a shared resource to be collision-free and even equitable A concrete example is a system using a Time Division Multiple Access (TDMA) protocol Nodes access the shared media only in their time slots to send messages with no collision Other potential applications are techniques to increase a sampling rate in multiple analog-to-digital converters, to schedule resource in multi-core processors, and to control traffic at intersections DESYNC [4] proposes a simple desynchronization framework as depicted in Figure The perimeter of a time circle represents a configurable firing period T of nodes oscillators The time position or phase of each node represents its turn to access a shared resource The system is desynchronized when all nodes are equally separated in the time circle Desynchronization can be categorized into two groups: Weak desynchronization(eg, INVERSE-MS[3]) distributes nodes equally in the time circle but distorts the time period (ie, the period is extended) Therefore, it is not suitable for systems that require an exact time period to access resources ACM SIGCOMM Computer Communication Review 8 Volume 4, Number, April

2 Strong desynchronization (eg, DESYNC [4], M-DE- SYNC [8]) is more desirable than weak desynchronization because of no period distortion Similar to DESYNC, we focus only on strong desynchronization due to their mentioned desirable property The DESYNC algorithm is simple and effective The phase of each node is an average phase of its two phase neighbors on the time circle However, DESYNC s error is quite high even after convergence because a phase error of a node can propagate to its phase neighbors and indefinitely circulate in the network (see Section 6) In this paper, we present DWARF (Desynchronization With an ARtificial Force field), a novel desychronization protocol that incurs low desynchronization error even in a highly dense network Our work is inspired by the robot circular formation with an electromagnetic-like force field [] In that work, robots of the same type have artificial forces to repel each other whereas robots of the different types have attracting forces For a certain coefficient of forces, a circle of heterogeneous robots can be formed (see Figure ) Similarly, if we think of nodes on a time circle as the robots of the same type, the nodes will repel each other and keep time intervals from their neighbors as far as possible Once all received forces are balanced, nodes are equally spread out in the time circle (ie, desynchronized) DWARF have the following contributions: DWARF is a distributed desynchronization algorithm using time phases of all neighbors to achieve the desyncrhony state DWARF does not require time synchronization, does not assume already slotted time, and does not incur any control message overhead DWARF is simple due to low complexity in terms of computation and memory Therefore, it is suitable for resource-constraint networks, such as wireless sensor networks Additionally, message complexity is low because the algorithm relies on the timing of the message, not information inside the message We have implemented and evaluated DWARF on TOS- SIM, a simulator for wireless sensor networks Our results indicate that DWARF scales well with network size and outperforms DESYNC significantly by achieving - 63% reduction in desynchronization error The rest of the paper is organized as follows Section covers the related works about desynchronization in wireless networks In Section 3, we overview the robot circular formation that motivates our work We describe our desynchronization protocol in Section 4 Section 5 analyses the convergence property of the protocol Then, we evaluate the performance in Section 6 Finally, Section 7 concludes the paper and discusses limitations as well as future works RELATED WORK To the best of our knowledge, DESYNC [4] is the first to introduce the desynchronization problem In DESYNC, a node simply attempts to stay in the middle between its previous and next phase neighbors By repeating this simple algorithm, all nodes will eventually be spread out However, the error is also propagated to the phase neighbors and indefinitely circulated inside a network Therefore, the DESYNC s error is quite high even after convergence Using phases of all neighbors, DWARF can achieve significantly lower desynchronization error than that of DESYNC Designed to converge faster than DESYNC, INVERSE- MS [3] is an inverse algorithm of the synchronicity work by Morollo and Strogatz [] At a steady state, INVERSE-MS maintains a dynamic equilibrium (ie, nodes keep changing time phases while maintaining desynchronization) However, the time period is distorted (ie, weak desynchronizaiton) M-DESYNC [8] proposes a localized multi-hop desynchronization protocol that works on a granularity of time slots M-DESYNC is strong desynchronization protocol that is designed to work on a multi-hop network The protocol estimatestherequirednumberoftimeslotswithatwo-hopmaximum degree This estimation helps M-DESYNC converge very fast However, M-DESYNC requires that all nodes have a global notion of time in order to share the common perception of time slots Additionally, M-DESYNC also requires additional message overhead for claiming the slots Conversely, DWARF does not require a global notion of time or additional message overhead Neither does DESYNC Motskin et al [] proposes a simple and lightweight strong desynchronization algorithm that is based on a graph coloring model The lightweight coloring algorithm works on general graph networks and does not need global time To ensure that the selected time slot does not overlap with others, a node needs to listen to the media for a full time period before claiming the slot Without a common notion of time, the starting time of each slot is quite random As a result, several time gaps are too small to be used as time slots This external fragmentation problem reduces resource utilization of the system Additionally, to converge faster, their algorithm overestimates the number of time slots Hence, several large time gaps are also left unused and the resource utilization is low In contrast, DESYNC and DWARF fully utilize resources even without a global notion of time Recently, Degesys and Nagpal[3] extend DESYNC to support multi-hop networks We also plan to similarly extend DWARF for multi-hop networks in our future work as well Other works that are similar to desynchronization protocols are distributed TDMA protocols Most of distributed TDMA protocols (eg, TRAMA [4], Parthasarathy [], ED-TDMA [6], and Herman [7]) assume time is already slotted or all nodes are synchronized to achieve the same global clock Some distributed TDMA protocols do not require time synchronization However, they require more states and incur control message overhead For example, DRAND [5] requires the control overhead for sending request, reject, release, and grant messages In our work, again, we do not require time synchronization, do not assume already slotted time, and do not incur any control message overhead 3 MOTIVATION We observe that the desynchronization framework is similar to the circular formation of heterogeneous robots [] In robotics, some tasks are too difficult for a single robot to accomplish by itself Some even require multiple robots with different types For such tasks, heterogeneous robots are distributedly grouped into teams that are equally spread out to cover the monitored area Each robot has no global knowledge of others absolute positions but can detect rela- ACM SIGCOMM Computer Communication Review 9 Volume 4, Number, April

3 Figure : Results of Robotic Circular Formation in [] Robots with two different types form the circle tivepositionsoftheotherswithrespecttoitselfaswellasthe type of the others To form a circle, an artificial force is used as an abstraction for velocity adaptation of a robot Robots of different types have attracting forces to each other Conversely, robots of the same type have repelling forces As a result, the circle of heterogeneous robots will be formed and robots are nicely spaced on the circle (see Figure ) In our work, a node (like a robot) does not have a global notion of time but each node can measure relative time differences with other nodes The circle of robots is similar to our circle of time period The distribution of robots can be mapped to the distribution of nodes on the time circle The work inspires us to design a novel desynchronization protocol for wireless networks based on an artificial force field In this paper, the circle is temporal rather than spatial and only repelling forces are required to space nodes on the time circle 4 DESYNCHRONIZATION PROTOCOL We first describe the concept of an artificial force field in Section 4 and explain our algorithm in Section 4 Like DESYNC [4] and INVERSE-MS [3], we assume a one-hop network in this paper Similar to DESYNC, our protocol can also be extended for multi-hop networks We discuss this assumption in Section 7 4 Artificial Force Field An artificial force field is an analogy to the circle of a time period Nodes are in the same force field if they can communicate with each other If node i and node j are on the same force field, they have repelling forces to push one another away A closer pair of nodes has a higher magnitude of force than a farther pair does The time interval between two nodes is derived from the phase difference between them If two nodes have a small phase difference, they have a high magnitude of force and vice versa In other word, a repelling force is an inverse of a phase difference between two nodes: f ij = φ ij/t, φij ( T, T ), () where f ij is the repelling force from node j to node i on a time period T and φ ij is the phase difference between node i and j We note that φ ij is not equal to because if two nodes fire at the same time, their firings collide and two nodes do not record other s firing Additionally, at T or T, a node does not repel an opposite node because they are balanced A repelling force can be positive (clockwise repelling) or negative (counterclockwise repelling) A positive force is created by a node on the left half of the circle relative to Figure 3: Artificial Force Field Arrow lines represent repelling forces from node, 3, and 4 to node A shorter and thicker line is a stronger force A force from node 4 is a positive force and two forces from node and 3 are negative forces the considered node whereas a negative force is created by a nodeontherighthalf Figure3representsafieldofrepelling forces on node Each node in the force field moves to a new time position or phase proportional to the total received force Given n nodes in a force field, the total force on a node i is the following: F i = f ij () j= Eventually, nodes reach an equilibrium state whereby the total force of the system is close to zero and each pair of phase neighboring nodes has the same time interval This equilibrium state also indicates the desynchrony state because all nodes are equally spaced on the time circle 4 Algorithm We assume that, initially, nodes are not desynchronized Each node sets a timer to fire in T time unit After setting the timer, each node listens to all neighbors until its timer expires When receiving a firing message from its neighbor, the (positive or negative) repelling force from that neighbor is calculated based on the phase difference When the timer expires, a node broadcasts a firing message to neighbors Then, the node calculates a new time phase to move on the circle based on the summation of forces from all neighbors and sets a new timer according to the new time phase Reasonably, one may wonder how far a node should move or adjust its phase In our work, given the total received force F i, the node i adjusts to a new time phase φ i, φ i = (φ i +KF i) mod T, (3) where φ i is the current phase of the node i Undoubtedly, the proper value of the coefficient K leads to the proper new phase The value of K is similar to a step size which is used in artificial intelligence techniques Therefore, if the value of K is too small, the system takes much time to converge On the other hand, if the value of K is too large, the system may overshoot the optimal value and does not converge We observe that, given the same time period, fewer nodes in the system result in bigger phase difference between two phase neighbors To be desynchronized, nodes in sparse networks must make a bigger adjustment to their time phases than nodes in dense networks must Therefore, the same total received force should have a bigger impact on ACM SIGCOMM Computer Communication Review Volume 4, Number, April

4 K 5 5 Data Trendline Number of Neighbors (nodes) Figure 4: Relation of the coefficient K with the number of nodes n a node in sparse networks than on a node in dense networks To reflect this observation, the coefficient K is inversely proportional to a power of the number of nodes n, K = c n c,c,c (4) Therefore, we have conducted an experiment to find the proper value of c and c We set the time period T to Additionally, we have varied the number of nodes and have searched for the K values that led to low errors (see Figure 4) Using power regression on the result, we have deduced a relation of K and n (the trendline) We have also found the proper value of c and c as follows: K = n 874 However, this K value is derived by setting T equal to Therefore, for arbitrary T, K = n 874 T (5) We explain other details of the experiment and proof of Equation 5 in Appendix A All nodes in the artificial force field (in the period circle) iteratively run the same algorithm until the forces are balanced (ie, all nodes are in the desynchrony state) The pseudo-code of this algorithm is shown in Appendix B 5 STABILITY ANALYSIS To mathematically analyze the stability of the algorithm (ie, the algorithm converges to the steady desynchronized state) is rather complicated The stability analysis of standard dynamical systems does not suffice because the force function is non-linear and the transformation matrix to find the eigenvalues cannot be formed Therefore, we have tested the stability by simulation In each simulation scenario, nodes randomly wake up Our simulation result shows that the system always converge except when there are too many nodes within a short period (ie, the time gap between each firing may be shorter than the message delay) In other words, the system is over-saturated The result is shown in Section 63 We believe that the non-linear dynamic systems analysis based on the Lyapunov stability theory could prove our conjecture However, one of the reasons that the system converges (nodes are nicely spread) is that our objective function (ie, the summation of received forces at all nodes) is convex Therefore, it contains only one global minima and no local minima The proof of convexity is shown in Appendix Normalized Root Mean Square Error 5 DESYNC DWARF Number of Neighbors (nodes) Figure 5: Root mean square error normalized by perfect phase difference after 3 time periods D Our algorithm attempts to reduce the value of the objective function overtime and eventually reach a value near the global minima However, the system does not always converge To converge, the system must meet two criteria First, the value of K must be proper (see Section 4) Second, the number of nodes within a time period must not be too high Otherwise, the system may be over-saturated 6 EVALUATION In this section, we evaluate the performance of our proposed mechanism and compare with DESYNC [4] because DESYNC and our mechanism share the same goal and requirements Particularly, they do not require time synchronization, do not assume already slotted time, do not need to look into the packet content, and do not incur control packets but still achieve equivalent time spaces Other protocols (eg, M-DESYNC [8], Lightweight []) assume different requirements Therefore, we only discuss our differences with such protocols in Section The performance metrics in this evaluation are desynchronization error and convergence time The former indicates how close the current state is to the perfect desynchrony state The latter indicates how fast the algorithm converges 6 Evaluation Environment We implement DWARF on TinyOS, an operating system for wireless sensor networks and evaluate the protocol on TOSSIM, a TinyOS simulator We vary the one-hop network size from 4 to 64 nodes Each node periodically fires a message that contains only application data with no extra control overhead This zero overhead is the advantage of both DWARF and DESYNC because, to avoid collisions, a node only needs to know the timing of the firing rather than the control information inside a packet In our simulation, for both DWARF and DESYNC, we use a -byte node ID and a -byte counter as the data However, we do use the regular -byte CC4 header for TOSSIM Therefore, we do not measure the overhead in our evaluation We set the time period to 5 milliseconds and compare our result with that of DESYNC The step size (α) of DESYNC is set to 95 (the same value used in [4]) Initially, the phase of each node is random in a range of to 5 6 Desynchronization Error To measure the desynchronization error, we run the simulation for 3 time periods In each network size, we run the simulation for 3 times Then, we measure the average root mean square error (RMSE) The error (ERR) is the mea- ACM SIGCOMM Computer Communication Review Volume 4, Number, April

5 Normalized Root Mean Square Error 5 DESYNC-8 DWARF-8 DESYNC-4 DWARF (a) Sparse (4 and 8 nodes) Normalized Root Mean Square Error 5 DESYNC-3 DWARF-3 DESYNC-6 DWARF (b) Dense (6 and 3 nodes) Normalized Root Mean Square Error 5 DESYNC-64 DWARF-64 DESYNC-48 DWARF (c) Extremely Dense (48 and 64 nodes) Figure 6: Convergence time and root mean square error normalized by expected phase difference sured phase difference minus the perfect phase difference: ERR i = φ ij T/n, n i= RMSE = ERR i, n where node j is the next phase neighbor of node i φ ij is the phase difference between node i and node j on the time period T Given that n is the total number of nodes, T/n is the perfect phase difference However, a smaller absolute error in a dense network is not necessarily better than a bigger error in a sparse network because the perfect phase difference in a dense network is also smaller than that in a sparse network Thus, for a comparable view of each network size, we also measure a normalized root mean square error (NRMSE) that is a ratio of the root mean square error and the perfect phase difference of each network size Figure 5 illustrates the result of the normalized desynchronization error in each network size after 3 time periods (see Figure C in Appendix C for the absolute root mean square errors) The result indicates that, in all network sizes (4-64 nodes), DWARF achieves significantly better desynchrony states than DESYNC does Understandably, using information from all neighbors (as in DWARF) leads to lower errors than using information from only two phase neighbors (as in DESYNC) does Furthermore, DESYNC s mechanism allows the phase error of a node to propagate to its phase neighbors A part of this error will propagate back and forth between two phase neighbors as well as circulate inside the network As a result, DESYNC s error after convergence is still quite large In contrast, DWARF is robust to this error propagation Even though the error propagation may still occur, the impact is not significant Given that DWARF uses the sum of forces from all neighbors, an error from one neighbor does not overwhelm the system We note that we show RMSE and NRMSE after 3 periods because, by that time, the errors of all simulation scenarios seem to be stable The actual convergence time in most scenarios is much lower than 3 rounds (see the next section) 63 Convergence Time In desynchronization error evaluation, we only measure the performance after 3 time periods However, the previous result does not indicate whether the protocols have converged or not Neither does it indicate how fast the protocols have converged Hence, we also measure the absolute root mean square error and normalized root mean square error for each time period (absolute root mean square errors are shown in Appendix C) In sparse networks (Figure 6a), both protocols converge with similar small error but DWARF converges slightly faster In dense networks(figure 6b) and extremely dense networks (Figure 6c), DESYNC converges but errors highly fluctuate whereas DWARF converges faster and errors are more stable Furthermore, in dense and extremely dense networks, the normalized root mean square errors of DESYNC after convergence is higher or equal to This means that the error is very large compared to the perfect phase difference Conversely, the normalized error of DWARF is lower than even in the extremely dense networks Therefore, DWARF scales well with the network density whereas DESYNC does not In a denser network, the errors of DESYNC and DWARF are higher because the probability of message collisions increases (see the next section) 64 Correlation of Packet Loss and Desynchronization Error In this section, we investigate the correlation of packet loss and desynchronization error by setting all nodes to wake up simultaneously Due to space limitation, we only include the results of DWARF in networks of 8, 3, and 64 nodes for 3 time periods (Figure 7) However, in networks of 4, 6, and 48 nodes, the results are similar (not shown) At the beginning, the network is far from the desynchrony state and messages from different nodes are simultaneously fired This results in lost packets and errors However, over time, nodes gradually adapt their time phases Consequently, the number of lost packets and the error also gradually drop 7 CONCLUSION AND DISCUSSION In this paper, we present DWARF, a novel strong desynchronization protocol that enables nodes in a system to perform tasks at different time To the best of our knowledge, DWARF is the first desynchronization protocol that is based on the concept of electromagnetic fields, a foundation of physics Our protocol is completely distributed and localized with no reliance on a centralized node or a global notion of time Due to low complexity in terms of computation, memory, and message overhead, DWARF is suitable for traditional ACM SIGCOMM Computer Communication Review Volume 4, Number, April

6 Normalized root mean square error NRMSE Normalized root mean square error NRMSE Normalized root mean square error NRMSE (a) 8 nodes (b) 3 nodes (c) 64 nodes Figure 7: Correlation of packet loss and desynchronization error wireless networks as well as resource-constraint wireless sensor networks Our preliminary result indicates that DWARF can significantly outperform DESYNC by reducing - 63% of the desynchronization error In addition, DWARF scales well with network size given that the normalized error is lower than even in extremely dense networks Giventhatthisworkisstillinanearlystage, thereisroom to improve and to extend the idea before we can realize the full potential of DWARF Recently, Degesys[3] has extended the DESYNC concept to support multi-hop topologies The extension is also applicable to DWARF Therefore, we believe that DWARF can be similarly extended for multi-hop topologies as well In addition, the force function of DWARF is not limited to the sum of rational functions Other different force functions (eg squared, cubed) are possible and viable for further investigation We plan to evaluate DWARF on real wireless devices and to explore other extensions in our future work 8 REFERENCES [] K Apicharttrisorn, S Choochaisri, and C Intanagonwiwat Energy-efficient gradient time synchronization for wireless sensor networks In Proc of the International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN, [] N Boonpinon and A Sudsang Heterogeneity driven circular formation In Proc of the IEEE International Conference on Robotics and Biomimetics, ROBIO 6, 6 [3] J Degesys and R Nagpal Towards desynchronization of multi-hop topologies In Proc of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 8, 8 [4] J Degesys, I Rose, A Patel, and R Nagpal DESYNC: Self-organizing desynchronization and TDMA on wireless sensor networks In Proc of the International Symposium on Information Processing in Sensor Networks, IPSN 7, 7 [5] S Ganeriwal, R Kumar, and M B Srivastava Timing-sync protocol for sensor networks In Proc of the International Conference on Embedded Networked Sensor Systems, SenSys 3 ACM, 3 [6] H Gong, M Liu, G Chen, and X Zhang A study on event-driven tdma protocol for wireless sensor networks EURASIP J Wirel Commun Netw, :9: 9:, February [7] T Herman and S Tixeuil A distributed tdma slot assignment algorithm for wireless sensor networks In Algorithmic Aspects of Wireless Sensor Networks, volume 3 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, 4 [8] H Kang and J Wong A localized multi-hop desynchronization algorithm for wireless sensor networks In Proc of the IEEE INFOCOM, 9 [9] M Maróti, B Kusy, G Simon, and A Lédeczi The flooding time synchronization protocol In Proc of the International Conference on Embedded Networked Sensor Systems, SenSys 4 ACM, 4 [] R E Mirollo and S H Strogatz Synchronization of pulse-coupled biological oscillators SIAM J Appl Math, 5:645 66, November 99 [] A Motskin, T Roughgarden, P Skraba, and L Guibas Lightweight coloring and desynchronization for networks In Proc of the IEEE INFOCOM, 9 [] S Parthasarathy and R Gandhi Distributed algorithms for coloring and domination in wireless adhoc networks In FSTTCS 4: Foundations of Software Technology and Theoretical Computer Science, volume 338 of Lecture Notes in Computer Science, pages [3] A Patel, J Degesys, and R Nagpal Desynchronization: The theory of self-organizing algorithms for round-robin scheduling In Proc of the International Conference on Self-Adaptive and Self-Organizing Systems, SASO 7, 7 [4] V Rajendran, K Obraczka, and J J Garcia-Luna-Aceves Energy-efficient, collision-free medium access control for wireless sensor networks Wirel Netw, :63 78, February 6 [5] I Rhee, A Warrier, J Min, and L Xu Drand: Distributed randomized tdma scheduling for wireless ad hoc networks IEEE Transactions on Mobile Computing, 8(): , oct 9 [6] P Sommer and R Wattenhofer Gradient clock synchronization in wireless sensor networks In Proc of the International Conference on Information Processing in Sensor Networks, IPSN 9, 9 [7] G Werner-Allen, G Tewari, A Patel, M Welsh, and R Nagpal Firefly-inspired sensor network synchronicity with realistic radio effects In Proc of the International Conference on Embedded Networked Sensor Systems, SenSys 5 ACM, 5 ACM SIGCOMM Computer Communication Review 3 Volume 4, Number, April

7 APPENDIX A FINDING K-N RELATION In this section, we explain in details how we find the proper values of c and c for the relation between K and n values We set a time period T to and vary the number of nodes In the specific number of nodes, we first simulate to see the trend of the value K that leads to small errors Then, we select a range of good K values After that, we simulate times to obtain the average desynchronization error for each K value In each simulation, we randomly set aninitialphaseofeachnodebetweenandt (periodvalue) Finally, weselectthek valuethatresultsinthelowesterror After getting the proper K value for each number of nodes, we plot the relation between K and the number of nodes (Figure 4) and use a mathematic tool to calculate the power regression The obtained relation function between K and n (the trendline in Figure 4) consists of c and c values as follows: K = n 874 However, this K value is derived by setting T equal to Therefore, for arbitrary T, K = n 874 T Proof From Equation and 3, the phase of node j is adjusted by KF j = K n i j fi,j = n i j Kfi,j Therefore, we can analyze the value of K from only single force f i,j For the time circle of a period T p, let θ p be an angle between two nodes on the circle and Θ p be an angle between the new adjusted phase and the old phase based on a single force where θ p,θ p (,π) Hence, and θ p π = φi,j T p, (6) Θ p π = Kfi,j T p (7) Ifθ oft equalstoθ oft, bothofthemshouldbeadjusted with the same angle amount Θ = Θ Thus, from Equation 7, K f i,j() T Θ = Θ From Equation and 6, f i,j = = Kf i,j() T K π = Kπ T θ T θ K = K T T φ i,j /T p = π θ p, consequently, K = K T T (8) At T =, we get K = n 874 Therefore, from Equation 8, for arbitrary T, K = n 874 T Root Mean Square Error DESYNC DWARF Number of Neighbors (nodes) Figure C: Absolute root mean square error after 3 time periods B PSEUDOCODE : Initialization : T = T imep eriod {Configurable Time Period} 3: n = {Number of receiving messages including itself} 4: F = {Force Summation} 5: lastf iringt ime = localt ime 6: currentp hase = localt ime modulo T 7: Set a firing timer to be T unit time 8: Upon timer firing 9: Broadcast a firing message to neighbors : lastf iringt ime = localt ime : currentp hase = localt ime modulo T : K = n 874 T 3: newphase = currentphase+(k F) 4: if newphase < then 5: newphase = T +newphase 6: end if 7: Set a firing timer to be fired at (newphase modulo T) 8: F = 9: n = : Upon receiving a firing message : n = n+ : phasediff = localt ime lastf iringt ime 3: if phasediff == T then 4: F = F + {Balanced force} 5: else if phasediff < T then 6: F = F + {Positive force} phasediff/t 7: else 8: F = F {Negative force} (T phasediff)/t 9: end if C ABSOLUTE ROOT MEAN SQUARE ER- ROR In this section, we show the simulation results of average root mean square errors without normalization Figure C indicates the absolute root mean square errors after 3 rounds that we evaluate in Section 6 Figure C indicates the convergence time and the absolute root mean square errors that we evaluate in Section 63 D PROOF OF CONVEXITY Theorem The system force summation function has one global minima and no local minima ACM SIGCOMM Computer Communication Review 4 Volume 4, Number, April

8 Root Mean Square Error DESYNC-8 DWARF-8 DESYNC-4 DWARF-4 Root Mean Square Error DESYNC-3 DWARF-3 DESYNC-6 DWARF-6 Root Mean Square Error DESYNC-64 DWARF-64 DESYNC-48 DWARF (a) Sparse (b) Dense (c) Extremely Dense Figure C: Convergence time and absolute root mean square error To prove Theorem, let F i be the force summation at node i and i,j ( T, T ) is an interval between node i and j If i,j >, the node j repels the node i in a positive direction In contrast, if i,j <, the node j repels the node i in a negative direction Therefore, for n nodes, F i can be formulated as the following equation, F i = i,j j= The objective function E of the system is the summation of absolute received forces at all nodes, E = F i = i= i= i,j (9) j= To prove the function E is a convex function, we must prove that two following conditions are satisfied; ) the set of all i,j isaconvexsetand)thehessianmatrixofe ispositive semidefinite Proposition A set of all possible interval i,j is a convex set Proof A set of ( T, T ) is a line connecting between T and T Therefore, any i,j, i,j ( T, T ) and α R with α, α i,j +( α) i,j ( T, T ) Proposition The Hessian of the function E is positive semidefinite Proof Let H be the Hessian matrix of the objective function E, E E,, n,n E H =,3, E,3 n,n E n,n, E n,n For any x,y, we derive the first-order derivative as follows, E x,y = nj= j x nj= j x x,j x,j ( ) x,y For the second-order partial derivatives, if we differentiate with the same x,y, E = x,y nj= j x nj= j x x,j x,j ( 3 x,y ) In the other hand, if we differentiate with other u,v, where u x or v y, u,v x,y E = Therefore, the Hessian matrix of the function E is a, a,3 H =, a ( ) n,n where a i,j = u i u i 3 i,j and u i = n j= i,j To show that the Hessian matrix of the function E is positive semidefinite, we show that T H for all when T H = ( ),,3 n,n H = = = i= i= j= u i u i ( ) u i u i i,j j= i,j n u i u i= i ui = i= u i,,3 n,n Therefore, we can conclude that T H and the Hessian matrix of E is positive semidefinite From Proposition and, we derive the following lemma Lemma the function E is a convex function From Lemma, we consequently prove Theorem that the system force summation function has one global minima and no local minima ACM SIGCOMM Computer Communication Review 5 Volume 4, Number, April

Desynchronization with an Artificial Force Field for Wireless Networks

Desynchronization with an Artificial Force Field for Wireless Networks Desynchronization with an Artificial Force Field for Wireless Networks Supasate Choochaisri, Kittipat Apicharttrisorn, Kittiporn Korprasertthaworn, Pongpakdi Taechalertpaisarn, and Chalermek Intanagonwiwat

More information

An Orthodontics-Inspired Desynchronization Algorithm for Wireless Sensor Networks

An Orthodontics-Inspired Desynchronization Algorithm for Wireless Sensor Networks An Orthodontics-Inspired Desynchronization Algorithm for Wireless Sensor Networks Pongpakdi Taechalertpaisarn Department of Computer Engineering Chulalongkorn University Bangkok, Thailand Email: pongpakdi.t@student.chula.ac.th

More information

Towards Desynchronization of Multi-hop Topologies

Towards Desynchronization of Multi-hop Topologies Towards Desynchronization of Multi-hop Topologies Julius Degesys and Radhika Nagpal School of Engineering and Applied Sciences, Harvard University E-mail: {degesys,rad}@eecs.harvard.edu Abstract In this

More information

Complete a large project that embodies the major course topics Project should be simple but expandable The project should include:

Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: CSE 466: Course Project Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: Multiple device communication Deal with constrained

More information

Definition 1: A fixed point iteration scheme to approximate the fixed point, p, of a function g, = for all n 1 given a starting approximation, p.

Definition 1: A fixed point iteration scheme to approximate the fixed point, p, of a function g, = for all n 1 given a starting approximation, p. Supplemental Material: A. Proof of Convergence In this Appendix, we provide a computational proof that the circadian adjustment method (CAM) belongs to the class of fixed-point iteration schemes (FPIS)

More information

Complete a large project that embodies the major course topics Project should be simple but expandable The project should include:

Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: CSE 466: Course Project Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: Multiple device communication Deal with constrained

More information

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility 1 MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility Neung-Hyung Lee and Saewoong Bahk School of Electrical Engineering & Computer Science, Seoul National University, Seoul Korea

More information

Jitter-aware time-frequency resource allocation and packing algorithm

Jitter-aware time-frequency resource allocation and packing algorithm Jitter-aware time-frequency resource allocation and packing algorithm The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As

More information

Learning Utility for Behavior Acquisition and Intention Inference of Other Agent

Learning Utility for Behavior Acquisition and Intention Inference of Other Agent Learning Utility for Behavior Acquisition and Intention Inference of Other Agent Yasutake Takahashi, Teruyasu Kawamata, and Minoru Asada* Dept. of Adaptive Machine Systems, Graduate School of Engineering,

More information

Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating Arrhythmic Heart-Beat

Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating Arrhythmic Heart-Beat International Journal of Scientific and Research Publications, Volume 4, Issue 9, September 2014 1 Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating

More information

IEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 3, MARCH A Self-Structured Adaptive Decision Feedback Equalizer

IEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 3, MARCH A Self-Structured Adaptive Decision Feedback Equalizer SIGNAL PROCESSING LETTERS, VOL 13, NO 3, MARCH 2006 1 A Self-Structured Adaptive Decision Feedback Equalizer Yu Gong and Colin F N Cowan, Senior Member, Abstract In a decision feedback equalizer (DFE),

More information

Agent-Based Models. Maksudul Alam, Wei Wang

Agent-Based Models. Maksudul Alam, Wei Wang Agent-Based Models Maksudul Alam, Wei Wang Outline Literature Review about Agent-Based model Modeling disease outbreaks in realistic urban social Networks EpiSimdemics: an Efficient Algorithm for Simulating

More information

Learning and Adaptive Behavior, Part II

Learning and Adaptive Behavior, Part II Learning and Adaptive Behavior, Part II April 12, 2007 The man who sets out to carry a cat by its tail learns something that will always be useful and which will never grow dim or doubtful. -- Mark Twain

More information

Frequency Tracking: LMS and RLS Applied to Speech Formant Estimation

Frequency Tracking: LMS and RLS Applied to Speech Formant Estimation Aldebaro Klautau - http://speech.ucsd.edu/aldebaro - 2/3/. Page. Frequency Tracking: LMS and RLS Applied to Speech Formant Estimation ) Introduction Several speech processing algorithms assume the signal

More information

SEIQR-Network Model with Community Structure

SEIQR-Network Model with Community Structure SEIQR-Network Model with Community Structure S. ORANKITJAROEN, W. JUMPEN P. BOONKRONG, B. WIWATANAPATAPHEE Mahidol University Department of Mathematics, Faculty of Science Centre of Excellence in Mathematics

More information

An application of topological relations of fuzzy regions with holes

An application of topological relations of fuzzy regions with holes Chapter 5 An application of topological relations of fuzzy regions with holes 5.1 Introduction In the last two chapters, we have provided theoretical frameworks for fuzzy regions with holes in terms of

More information

Using Perceptual Grouping for Object Group Selection

Using Perceptual Grouping for Object Group Selection Using Perceptual Grouping for Object Group Selection Hoda Dehmeshki Department of Computer Science and Engineering, York University, 4700 Keele Street Toronto, Ontario, M3J 1P3 Canada hoda@cs.yorku.ca

More information

Early Detection of Lung Cancer

Early Detection of Lung Cancer Early Detection of Lung Cancer Aswathy N Iyer Dept Of Electronics And Communication Engineering Lymie Jose Dept Of Electronics And Communication Engineering Anumol Thomas Dept Of Electronics And Communication

More information

Statistical Methods and Reasoning for the Clinical Sciences

Statistical Methods and Reasoning for the Clinical Sciences Statistical Methods and Reasoning for the Clinical Sciences Evidence-Based Practice Eiki B. Satake, PhD Contents Preface Introduction to Evidence-Based Statistics: Philosophical Foundation and Preliminaries

More information

Reinforcement Learning : Theory and Practice - Programming Assignment 1

Reinforcement Learning : Theory and Practice - Programming Assignment 1 Reinforcement Learning : Theory and Practice - Programming Assignment 1 August 2016 Background It is well known in Game Theory that the game of Rock, Paper, Scissors has one and only one Nash Equilibrium.

More information

Investigations in Number, Data, and Space, Grade 4, 2nd Edition 2008 Correlated to: Washington Mathematics Standards for Grade 4

Investigations in Number, Data, and Space, Grade 4, 2nd Edition 2008 Correlated to: Washington Mathematics Standards for Grade 4 Grade 4 Investigations in Number, Data, and Space, Grade 4, 2nd Edition 2008 4.1. Core Content: Multi-digit multiplication (Numbers, Operations, Algebra) 4.1.A Quickly recall multiplication facts through

More information

CHAPTER 4 CONTENT LECTURE 1 November :28 AM

CHAPTER 4 CONTENT LECTURE 1 November :28 AM CHAPTER 4 By Radu Muresan University of Guelph Page 1 CHAPTER 4 CONTENT LECTURE 1 November 07 12 10:28 AM UNIPROCESSOR SCHEDULING Real Time Task Model Concepts Types of Real Time Tasks and Their Characteristics

More information

Artificial Neural Network : Introduction

Artificial Neural Network : Introduction Artificial Neural Network : Introduction Debasis Samanta IIT Kharagpur dsamanta@iitkgp.ac.in 23.03.2018 Debasis Samanta (IIT Kharagpur) Soft Computing Applications 23.03.2018 1 / 20 Biological nervous

More information

A model of parallel time estimation

A model of parallel time estimation A model of parallel time estimation Hedderik van Rijn 1 and Niels Taatgen 1,2 1 Department of Artificial Intelligence, University of Groningen Grote Kruisstraat 2/1, 9712 TS Groningen 2 Department of Psychology,

More information

Publisher: Pearson Education, Inc. publishing as Prentice Hall

Publisher: Pearson Education, Inc. publishing as Prentice Hall Section I. Correlation with the Mathematics 2009 SOL and Curriculum Framework Rating 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 Section II. Additional Criteria:

More information

3 CONCEPTUAL FOUNDATIONS OF STATISTICS

3 CONCEPTUAL FOUNDATIONS OF STATISTICS 3 CONCEPTUAL FOUNDATIONS OF STATISTICS In this chapter, we examine the conceptual foundations of statistics. The goal is to give you an appreciation and conceptual understanding of some basic statistical

More information

11/18/2013. Correlational Research. Correlational Designs. Why Use a Correlational Design? CORRELATIONAL RESEARCH STUDIES

11/18/2013. Correlational Research. Correlational Designs. Why Use a Correlational Design? CORRELATIONAL RESEARCH STUDIES Correlational Research Correlational Designs Correlational research is used to describe the relationship between two or more naturally occurring variables. Is age related to political conservativism? Are

More information

Pearson Edexcel International GCSE in Mathematics (Specification A) (9-1) Exemplar student answers with examiner comments

Pearson Edexcel International GCSE in Mathematics (Specification A) (9-1) Exemplar student answers with examiner comments Pearson Edexcel International GCSE in Mathematics (Specification A) (9-1) Exemplar student answers with examiner comments 1 Contents About this booklet... 3 How to use this booklet.... 3 Guide on the use

More information

Enhancements for RTT-Fair HighSpeed TCP

Enhancements for RTT-Fair HighSpeed TCP Enhancements for RTT-Fair HighSpeed TCP Damien Phillips, Jiankun Hu School of Computer Science and Information Technology, RMIT University GPO Box 2476V, Melbourne 31, Australia Email: {damphil, jiankun}@cs.rmit.edu.au

More information

Numerical Integration of Bivariate Gaussian Distribution

Numerical Integration of Bivariate Gaussian Distribution Numerical Integration of Bivariate Gaussian Distribution S. H. Derakhshan and C. V. Deutsch The bivariate normal distribution arises in many geostatistical applications as most geostatistical techniques

More information

CHAPTER ONE CORRELATION

CHAPTER ONE CORRELATION CHAPTER ONE CORRELATION 1.0 Introduction The first chapter focuses on the nature of statistical data of correlation. The aim of the series of exercises is to ensure the students are able to use SPSS to

More information

Local Image Structures and Optic Flow Estimation

Local Image Structures and Optic Flow Estimation Local Image Structures and Optic Flow Estimation Sinan KALKAN 1, Dirk Calow 2, Florentin Wörgötter 1, Markus Lappe 2 and Norbert Krüger 3 1 Computational Neuroscience, Uni. of Stirling, Scotland; {sinan,worgott}@cn.stir.ac.uk

More information

PCA Enhanced Kalman Filter for ECG Denoising

PCA Enhanced Kalman Filter for ECG Denoising IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 06-13 www.iosrjournals.org PCA Enhanced Kalman Filter for ECG Denoising Febina Ikbal 1, Prof.M.Mathurakani

More information

TCP-Friendly Equation-Based Congestion Control

TCP-Friendly Equation-Based Congestion Control TCP-Friendly Equation-Based Congestion Control (widmer@informatik.uni-mannheim.de) 09 December 2002 Overview Introduction to congestion control Equation-based congestion control (TFRC) Congestion control

More information

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1 Finding Information Sources by Model Sharing in Open Multi-Agent Systems Jisun Park, K. Suzanne Barber The Laboratory for Intelligent Processes and Systems The University of Texas at Austin 20 E. 24 th

More information

Modelling Spatially Correlated Survival Data for Individuals with Multiple Cancers

Modelling Spatially Correlated Survival Data for Individuals with Multiple Cancers Modelling Spatially Correlated Survival Data for Individuals with Multiple Cancers Dipak K. Dey, Ulysses Diva and Sudipto Banerjee Department of Statistics University of Connecticut, Storrs. March 16,

More information

ERA: Architectures for Inference

ERA: Architectures for Inference ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems

More information

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence To understand the network paradigm also requires examining the history

More information

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends Learning outcomes Hoare Logic and Model Checking Model Checking Lecture 12: Loose ends Dominic Mulligan Based on previous slides by Alan Mycroft and Mike Gordon Programming, Logic, and Semantics Group

More information

Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes

Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes So ware Engineering, Article ID 803530, 7 pages http://dx.doi.org/10.1155/2014/803530 Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes Dinesh Verma and Shishir

More information

MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1. Lecture 27: Systems Biology and Bayesian Networks

MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1. Lecture 27: Systems Biology and Bayesian Networks MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1 Lecture 27: Systems Biology and Bayesian Networks Systems Biology and Regulatory Networks o Definitions o Network motifs o Examples

More information

A Dynamic model of Pulmonary Vein Electrophysiology. Harry Green 2 nd year Ph.D. student University of Exeter

A Dynamic model of Pulmonary Vein Electrophysiology. Harry Green 2 nd year Ph.D. student University of Exeter A Dynamic model of Pulmonary Vein Electrophysiology Harry Green 2 nd year Ph.D. student University of Exeter Background to the Project Cardiac disease is the leading cause of death in most developed countries

More information

An epidemic spreading model based on community structure in dual social networks

An epidemic spreading model based on community structure in dual social networks International Journal of Microbiology and Mycology IJMM pissn: 2309-4796 http://www.innspub.net Vol. 5, No. 3, p. 1-10, 2017 Open Access RESEARCH PAPER An epidemic spreading model based on community structure

More information

Clustering of MRI Images of Brain for the Detection of Brain Tumor Using Pixel Density Self Organizing Map (SOM)

Clustering of MRI Images of Brain for the Detection of Brain Tumor Using Pixel Density Self Organizing Map (SOM) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 6, Ver. I (Nov.- Dec. 2017), PP 56-61 www.iosrjournals.org Clustering of MRI Images of Brain for the

More information

Recognition of English Characters Using Spiking Neural Networks

Recognition of English Characters Using Spiking Neural Networks Recognition of English Characters Using Spiking Neural Networks Amjad J. Humaidi #1, Thaer M. Kadhim *2 Control and System Engineering, University of Technology, Iraq, Baghdad 1 601116@uotechnology.edu.iq

More information

How Can We Improve the Blood Donation Process in the United States?

How Can We Improve the Blood Donation Process in the United States? How Can We Improve the Blood Donation Process in the United States? By H. H. Modeling Team: H. H. and Hilary Johnson Wilson High School Math Modeling and System Dynamics May 8, 009 System Dynamics Advisor:

More information

Pitfalls in Linear Regression Analysis

Pitfalls in Linear Regression Analysis Pitfalls in Linear Regression Analysis Due to the widespread availability of spreadsheet and statistical software for disposal, many of us do not really have a good understanding of how to use regression

More information

Identification of Tissue Independent Cancer Driver Genes

Identification of Tissue Independent Cancer Driver Genes Identification of Tissue Independent Cancer Driver Genes Alexandros Manolakos, Idoia Ochoa, Kartik Venkat Supervisor: Olivier Gevaert Abstract Identification of genomic patterns in tumors is an important

More information

Block-upscaling of transport in heterogeneous aquifers

Block-upscaling of transport in heterogeneous aquifers 158 Calibration and Reliability in Groundwater Modelling: From Uncertainty to Decision Making (Proceedings of ModelCARE 2005, The Hague, The Netherlands, June 2005). IAHS Publ. 304, 2006. Block-upscaling

More information

Automatic Detection of Anomalies in Blood Glucose Using a Machine Learning Approach

Automatic Detection of Anomalies in Blood Glucose Using a Machine Learning Approach Automatic Detection of Anomalies in Blood Glucose Using a Machine Learning Approach Ying Zhu Faculty of Business and Information Technology University of Ontario Institute of Technology 2000 Simcoe Street

More information

(CORRELATIONAL DESIGN AND COMPARATIVE DESIGN)

(CORRELATIONAL DESIGN AND COMPARATIVE DESIGN) UNIT 4 OTHER DESIGNS (CORRELATIONAL DESIGN AND COMPARATIVE DESIGN) Quasi Experimental Design Structure 4.0 Introduction 4.1 Objectives 4.2 Definition of Correlational Research Design 4.3 Types of Correlational

More information

Simple Linear Regression the model, estimation and testing

Simple Linear Regression the model, estimation and testing Simple Linear Regression the model, estimation and testing Lecture No. 05 Example 1 A production manager has compared the dexterity test scores of five assembly-line employees with their hourly productivity.

More information

Thalamocortical Feedback and Coupled Oscillators

Thalamocortical Feedback and Coupled Oscillators Thalamocortical Feedback and Coupled Oscillators Balaji Sriram March 23, 2009 Abstract Feedback systems are ubiquitous in neural systems and are a subject of intense theoretical and experimental analysis.

More information

LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES

LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES Reactive Architectures LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES An Introduction to MultiAgent Systems http://www.csc.liv.ac.uk/~mjw/pubs/imas There are many unsolved (some would say insoluble) problems

More information

Feedback-Controlled Parallel Point Process Filter for Estimation of Goal-Directed Movements From Neural Signals

Feedback-Controlled Parallel Point Process Filter for Estimation of Goal-Directed Movements From Neural Signals IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, VOL. 21, NO. 1, JANUARY 2013 129 Feedback-Controlled Parallel Point Process Filter for Estimation of Goal-Directed Movements From Neural

More information

Learning Classifier Systems (LCS/XCSF)

Learning Classifier Systems (LCS/XCSF) Context-Dependent Predictions and Cognitive Arm Control with XCSF Learning Classifier Systems (LCS/XCSF) Laurentius Florentin Gruber Seminar aus Künstlicher Intelligenz WS 2015/16 Professor Johannes Fürnkranz

More information

Grounding Ontologies in the External World

Grounding Ontologies in the External World Grounding Ontologies in the External World Antonio CHELLA University of Palermo and ICAR-CNR, Palermo antonio.chella@unipa.it Abstract. The paper discusses a case study of grounding an ontology in the

More information

Performance of Median and Least Squares Regression for Slightly Skewed Data

Performance of Median and Least Squares Regression for Slightly Skewed Data World Academy of Science, Engineering and Technology 9 Performance of Median and Least Squares Regression for Slightly Skewed Data Carolina Bancayrin - Baguio Abstract This paper presents the concept of

More information

MEA DISCUSSION PAPERS

MEA DISCUSSION PAPERS Inference Problems under a Special Form of Heteroskedasticity Helmut Farbmacher, Heinrich Kögel 03-2015 MEA DISCUSSION PAPERS mea Amalienstr. 33_D-80799 Munich_Phone+49 89 38602-355_Fax +49 89 38602-390_www.mea.mpisoc.mpg.de

More information

Modeling Sentiment with Ridge Regression

Modeling Sentiment with Ridge Regression Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,

More information

The Dynamics of Two Cognitive Heuristics for Coordination on Networks

The Dynamics of Two Cognitive Heuristics for Coordination on Networks IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust The Dynamics of Two Cognitive Heuristics for Coordination on Networks Iyad Rahwan

More information

Marriage Matching with Correlated Preferences

Marriage Matching with Correlated Preferences Marriage Matching with Correlated Preferences Onur B. Celik Department of Economics University of Connecticut and Vicki Knoblauch Department of Economics University of Connecticut Abstract Authors of experimental,

More information

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Okan Turkes, Hans Scholten, and Paul Havinga Dept. of Computer Engineering, Pervasive Systems University of

More information

Position Paper: How Certain is Recommended Trust-Information?

Position Paper: How Certain is Recommended Trust-Information? Position Paper: How Certain is Recommended Trust-Information? Uwe Roth University of Luxembourg FSTC Campus Kirchberg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg uwe.roth@uni.lu ABSTRACT Nowadays

More information

Find the slope of the line that goes through the given points. 1) (-9, -68) and (8, 51) 1)

Find the slope of the line that goes through the given points. 1) (-9, -68) and (8, 51) 1) Math 125 Semester Review Problems Name Find the slope of the line that goes through the given points. 1) (-9, -68) and (8, 51) 1) Solve the inequality. Graph the solution set, and state the solution set

More information

Appendix B Statistical Methods

Appendix B Statistical Methods Appendix B Statistical Methods Figure B. Graphing data. (a) The raw data are tallied into a frequency distribution. (b) The same data are portrayed in a bar graph called a histogram. (c) A frequency polygon

More information

Active Sites model for the B-Matrix Approach

Active Sites model for the B-Matrix Approach Active Sites model for the B-Matrix Approach Krishna Chaithanya Lingashetty Abstract : This paper continues on the work of the B-Matrix approach in hebbian learning proposed by Dr. Kak. It reports the

More information

Parametric Optimization and Analysis of Adaptive Equalization Algorithms for Noisy Speech Signals

Parametric Optimization and Analysis of Adaptive Equalization Algorithms for Noisy Speech Signals IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676, p-issn: 2320 3331, Volume 4, Issue 6 (Mar. -Apr. 2013), PP 69-74 Parametric Optimization and Analysis of Adaptive Equalization

More information

Network Analysis of Toxic Chemicals and Symptoms: Implications for Designing First-Responder Systems

Network Analysis of Toxic Chemicals and Symptoms: Implications for Designing First-Responder Systems Network Analysis of Toxic Chemicals and Symptoms: Implications for Designing First-Responder Systems Suresh K. Bhavnani 1 PhD, Annie Abraham 1, Christopher Demeniuk 1, Messeret Gebrekristos 1 Abe Gong

More information

The Effect of Code Coverage on Fault Detection under Different Testing Profiles

The Effect of Code Coverage on Fault Detection under Different Testing Profiles The Effect of Code Coverage on Fault Detection under Different Testing Profiles ABSTRACT Xia Cai Dept. of Computer Science and Engineering The Chinese University of Hong Kong xcai@cse.cuhk.edu.hk Software

More information

Further Mathematics 2018 CORE: Data analysis Chapter 3 Investigating associations between two variables

Further Mathematics 2018 CORE: Data analysis Chapter 3 Investigating associations between two variables Chapter 3: Investigating associations between two variables Further Mathematics 2018 CORE: Data analysis Chapter 3 Investigating associations between two variables Extract from Study Design Key knowledge

More information

Empirical Formula for Creating Error Bars for the Method of Paired Comparison

Empirical Formula for Creating Error Bars for the Method of Paired Comparison Empirical Formula for Creating Error Bars for the Method of Paired Comparison Ethan D. Montag Rochester Institute of Technology Munsell Color Science Laboratory Chester F. Carlson Center for Imaging Science

More information

2012 Course : The Statistician Brain: the Bayesian Revolution in Cognitive Science

2012 Course : The Statistician Brain: the Bayesian Revolution in Cognitive Science 2012 Course : The Statistician Brain: the Bayesian Revolution in Cognitive Science Stanislas Dehaene Chair in Experimental Cognitive Psychology Lecture No. 4 Constraints combination and selection of a

More information

Sparse Coding in Sparse Winner Networks

Sparse Coding in Sparse Winner Networks Sparse Coding in Sparse Winner Networks Janusz A. Starzyk 1, Yinyin Liu 1, David Vogel 2 1 School of Electrical Engineering & Computer Science Ohio University, Athens, OH 45701 {starzyk, yliu}@bobcat.ent.ohiou.edu

More information

7 Grip aperture and target shape

7 Grip aperture and target shape 7 Grip aperture and target shape Based on: Verheij R, Brenner E, Smeets JBJ. The influence of target object shape on maximum grip aperture in human grasping movements. Exp Brain Res, In revision 103 Introduction

More information

Toward A Cognitive Computer Vision System

Toward A Cognitive Computer Vision System Toward A Cognitive Computer Vision System D. Paul Benjamin Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 benjamin@pace.edu Damian Lyons Fordham University, 340 JMH, 441 E. Fordham

More information

A Neurally-Inspired Model for Detecting and Localizing Simple Motion Patterns in Image Sequences

A Neurally-Inspired Model for Detecting and Localizing Simple Motion Patterns in Image Sequences A Neurally-Inspired Model for Detecting and Localizing Simple Motion Patterns in Image Sequences Marc Pomplun 1, Yueju Liu 2, Julio Martinez-Trujillo 2, Evgueni Simine 2, and John K. Tsotsos 2 1 Department

More information

Enhancement of VCO Linearity and Phase Noise by Implementing Frequency Locked Loop

Enhancement of VCO Linearity and Phase Noise by Implementing Frequency Locked Loop EUROCON 2007 The International Conference on Computer as a Tool Warsaw, September 9-12 Enhancement of VCO Linearity and Phase Noise by Implementing Frequency Locked Loop Emre Ayranci, Kenn Christensen,

More information

Study Guide for the Final Exam

Study Guide for the Final Exam Study Guide for the Final Exam When studying, remember that the computational portion of the exam will only involve new material (covered after the second midterm), that material from Exam 1 will make

More information

APPENDIX N. Summary Statistics: The "Big 5" Statistical Tools for School Counselors

APPENDIX N. Summary Statistics: The Big 5 Statistical Tools for School Counselors APPENDIX N Summary Statistics: The "Big 5" Statistical Tools for School Counselors This appendix describes five basic statistical tools school counselors may use in conducting results based evaluation.

More information

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation U. Baid 1, S. Talbar 2 and S. Talbar 1 1 Department of E&TC Engineering, Shri Guru Gobind Singhji

More information

Comparison of volume estimation methods for pancreatic islet cells

Comparison of volume estimation methods for pancreatic islet cells Comparison of volume estimation methods for pancreatic islet cells Jiří Dvořák a,b, Jan Švihlíkb,c, David Habart d, and Jan Kybic b a Department of Probability and Mathematical Statistics, Faculty of Mathematics

More information

Connectivity in a Bipolar Fuzzy Graph and its Complement

Connectivity in a Bipolar Fuzzy Graph and its Complement Annals of Pure and Applied Mathematics Vol. 15, No. 1, 2017, 89-95 ISSN: 2279-087X (P), 2279-0888(online) Published on 11 December 2017 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v15n1a8

More information

Type II Fuzzy Possibilistic C-Mean Clustering

Type II Fuzzy Possibilistic C-Mean Clustering IFSA-EUSFLAT Type II Fuzzy Possibilistic C-Mean Clustering M.H. Fazel Zarandi, M. Zarinbal, I.B. Turksen, Department of Industrial Engineering, Amirkabir University of Technology, P.O. Box -, Tehran, Iran

More information

Unit 1 Exploring and Understanding Data

Unit 1 Exploring and Understanding Data Unit 1 Exploring and Understanding Data Area Principle Bar Chart Boxplot Conditional Distribution Dotplot Empirical Rule Five Number Summary Frequency Distribution Frequency Polygon Histogram Interquartile

More information

Operational Fault Tolerance of CMAC Networks

Operational Fault Tolerance of CMAC Networks 340 Carter, Rudolph and Nucci Operational Fault Tolerance of CMAC Networks Michael J. Carter Franklin J. Rudolph Adam J. Nucci Intelligent Structures Group Department of Electrical and Computer Engineering

More information

Prentice Hall Connected Mathematics 2, 8th Grade Units 2006 Correlated to: Michigan Grade Level Content Expectations (GLCE), Mathematics (Grade 8)

Prentice Hall Connected Mathematics 2, 8th Grade Units 2006 Correlated to: Michigan Grade Level Content Expectations (GLCE), Mathematics (Grade 8) NUMBER AND OPERATIONS Understand real number concepts N.ME.08.01 Understand the meaning of a square root of a number and its connection to the square whose area is the number; understand the meaning of

More information

Learning to Use Episodic Memory

Learning to Use Episodic Memory Learning to Use Episodic Memory Nicholas A. Gorski (ngorski@umich.edu) John E. Laird (laird@umich.edu) Computer Science & Engineering, University of Michigan 2260 Hayward St., Ann Arbor, MI 48109 USA Abstract

More information

arxiv: v1 [cs.ai] 28 Nov 2017

arxiv: v1 [cs.ai] 28 Nov 2017 : a better way of the parameters of a Deep Neural Network arxiv:1711.10177v1 [cs.ai] 28 Nov 2017 Guglielmo Montone Laboratoire Psychologie de la Perception Université Paris Descartes, Paris montone.guglielmo@gmail.com

More information

Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks

Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks Saikat Guha Raytheon BBN Technologies, Cambridge MA, USA Email: sguha@bbn.com Chi-Kin Chau University of Cambridge, Cambridge,

More information

GMAC. Scaling Item Difficulty Estimates from Nonequivalent Groups

GMAC. Scaling Item Difficulty Estimates from Nonequivalent Groups GMAC Scaling Item Difficulty Estimates from Nonequivalent Groups Fanmin Guo, Lawrence Rudner, and Eileen Talento-Miller GMAC Research Reports RR-09-03 April 3, 2009 Abstract By placing item statistics

More information

TIMS Lab 1: Phase-Locked Loop

TIMS Lab 1: Phase-Locked Loop TIMS Lab 1: Phase-Locked Loop Modules: VCO, Multiplier, Quadrature Utilities, Wideband True RMS Meter, Tuneable LPF, Digital Utilities, Noise Generator, Speech, Headphones 0 Pre-Laboratory Reading Phase-locked

More information

MITOCW ocw f99-lec20_300k

MITOCW ocw f99-lec20_300k MITOCW ocw-18.06-f99-lec20_300k OK, this is lecture twenty. And this is the final lecture on determinants. And it's about the applications. So we worked hard in the last two lectures to get a formula for

More information

Business Statistics Probability

Business Statistics Probability Business Statistics The following was provided by Dr. Suzanne Delaney, and is a comprehensive review of Business Statistics. The workshop instructor will provide relevant examples during the Skills Assessment

More information

A mathematical model of glucose-insulin interaction

A mathematical model of glucose-insulin interaction Science Vision www.sciencevision.org Science Vision www.sciencevision.org Science Vision www.sciencevision.org Science Vision www.sciencevision.org the alpha and beta cells of the pancreas respectively.

More information

Sound Preference Development and Correlation to Service Incidence Rate

Sound Preference Development and Correlation to Service Incidence Rate Sound Preference Development and Correlation to Service Incidence Rate Terry Hardesty a) Sub-Zero, 4717 Hammersley Rd., Madison, WI, 53711, United States Eric Frank b) Todd Freeman c) Gabriella Cerrato

More information

Large Graph Mining: Power Tools and a Practitioner s guide

Large Graph Mining: Power Tools and a Practitioner s guide Large Graph Mining: Power Tools and a Practitioner s guide Task 6: Virus/Influence Propagation Faloutsos, Miller,Tsourakakis CMU KDD'09 Faloutsos, Miller, Tsourakakis P6-1 Outline Introduction Motivation

More information